We are pulling the SecureScore via API to a SIEM and created an alert when the SecureScore is decreased, we now would like to find out the action or change that was performed which caused the SecureScore to be lowered. Any hints?
For instance our AdoptedODB score gone from 10 to 0 over night
- Did not find a mapping table but take the JSON value of AdoptedODB = "Store user Documents in OneDrive for Business". Thus this likely means "disabled OneDrive for Business"
- Via the "Audit Log Search" in the Security&Compliance do not see enable/disable ODB